Deep Learning in Biometrics 2018
DOI: 10.1201/b22524-11
|View full text |Cite
|
Sign up to set email alerts
|

Counteracting Presentation Attacks in Face, Fingerprint, and Iris Recognition

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 1 publication
0
6
0
1
Order By: Relevance
“…• good generalization capabilities: since the proposed algorithm is not trained for any specific pattern, and uses a simple observation that textured contact lenses will produce larger shadows than authentic iris when illuminated at different angles, this PAD is agnostic to contact lens brand or specific pattern printed on the lens; this is in general not true for image filtering-based feature extractors (including deep-learning-based solutions), which are known to perform worse in the openset testing scenario [13,15];…”
Section: Discussionmentioning
confidence: 99%
“…• good generalization capabilities: since the proposed algorithm is not trained for any specific pattern, and uses a simple observation that textured contact lenses will produce larger shadows than authentic iris when illuminated at different angles, this PAD is agnostic to contact lens brand or specific pattern printed on the lens; this is in general not true for image filtering-based feature extractors (including deep-learning-based solutions), which are known to perform worse in the openset testing scenario [13,15];…”
Section: Discussionmentioning
confidence: 99%
“…From a security point of view, continuous authentication with various modes faces different challenges. Countermeasures against various attacks on physiological biometrics have been discussed for decades [ 119 , 120 ], but, still, physiological biometrics are not considered secure authentication modes. Behavioral biometric-based approaches also face distinct security vulnerabilities.…”
Section: Security and Privacy Concernsmentioning
confidence: 99%
“…Many biometric techniques are available in the authentication process such as finger print recognition, eye pattern recognition, face recognition, voice pattern recognition, vein recognition and others. However, the fingerprint pattern recognition remains the most used technique for its simplicity of use of and cost effective [15][16][17]. The facial recognition is also considered as a good alternative to fingerprint since no physical interaction with the user is required and the results of matching are accurate if the image is well captured [18].…”
Section: Basics and Access Controlmentioning
confidence: 99%